Next Article in Journal
Model and Algorithm for a Two-Machine Group Scheduling Problem with Setup and Transportation Time
Next Article in Special Issue
Analysis of an Interface Crack between Piezoelectric Semiconductor Coating and Elastic Substrate Structure
Previous Article in Journal
Gaussian Mixture Probability Hypothesis Density Filter for Heterogeneous Multi-Sensor Registration
Previous Article in Special Issue
A Frequency/Phase/Amplitude Estimator for Three-Phase Applications Operating at a Low Sampling Rate
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Energy-Management Strategy of Battery Energy Storage Systems in DC Microgrids: A Distributed Fuzzy Output Consensus Control Considering Multiple Cyber Attacks

1
College of Information Science and Engineering, Northeastern University, Shenyang 110819, China
2
School of Electrical Engineering, Shandong University, Jinan 250061, China
3
Foshan Graduate School of Innovation, Northeastern University, Foshan 528311, China
*
Author to whom correspondence should be addressed.
Mathematics 2024, 12(6), 887; https://doi.org/10.3390/math12060887
Submission received: 19 February 2024 / Revised: 7 March 2024 / Accepted: 13 March 2024 / Published: 18 March 2024
(This article belongs to the Special Issue Mathematical Applications in Electrical Engineering)

Abstract

:
Distributed renewable sources are one of the most promising contributors for DC microgrids to reduce carbon emission and fuel consumption. Although the battery energy storage system (BESS) is widely applied to compensate the power imbalance between distributed generators (DGs) and loads, the impacts of disturbances, DGs, constant power loads (CPLs) and cyber attacks on this system are not simultaneously considered. Based on this, a distributed fuzzy output consensus control strategy is proposed to realize accurate current sharing and operate normally in the presence of denial of service (DoS) attacks and false data injection (FDI) attacks. Firstly, the whole model of the BESS in DC microgrids embedded into disturbance items, DGs, CPLs and resistive loads, is firstly built. This model could be further transformed into standard linear heterogeneous multi-agent systems with disturbance, which lays the foundation for the following control strategy. Then the model of FDI and DoS attacks are built. Meanwhile, the fuzzy logic controller (FLC) is applied to reduce the burden of communication among batteries. Based on these, a distributed output consensus fuzzy control is proposed to realize accurate current sharing among batteries. Moreover, the system under the proposed control in different cases is analyzed. Finally, the feasibility of the proposed control strategy is verified by numerical simulation results and experiment results.

1. Introduction

Distributed renewable sources have become one of the most effective contributors for DC microgrids to reduce carbon emission and fossil energy consumption [1,2]. The battery energy storage system (BESS) has been widely studied to solve the power imbalance between distributed generators (DGs) and loads [3]. However, loads in the BESS are always connected to the tightly controlled power electronic converters, and they are considered as constant power loads (CPLs), which have negative impedance characteristics [4,5]. This will cause the instability of the system. Meanwhile, the current among batteries should be shared based on the real time of state of charge (SoC) and the remaining capacity of battery for this system [6]. According to the literature [7], the multilevel control strategy including primary control and secondary control has been widely applied to solve current sharing control with CPLs.
Primary control has been widely applied to realize energy management in microgrids. Decentralized control strategies were proposed, which included the V-I droop controller and the current controller. Therein, battery inverters operated as voltage source converters (VSCs) and renewable energy source converters operated as current sources converters (CSCs) in this system [8,9]. To this end, CSCs could realize the maximum power point tracking (MPPT) in normal operating conditions [8]. And the voltage regulation was realized in the V-I droop controller. However, the accurate current sharing control among batteries was not realized due to the line impedance differences, which reduced battery utilization and caused overcharge/overdischarge for some batteries. Furthermore, these problems resulted in reduced battery lifetime and even fires [10].
In order to solve above problems, various secondary control strategies have been proposed, which can be separated into centralized control and distributed control. For centralized control, a quick communication system between the central controller and other controllers was required. The central controller collected the information from the entire system and sends control commands to other controllers, and it easily resulted in single-point failure and system errors with the increasing scale of power systems [11]. In order to solve these problems, distributed control was proposed, which only required a sparse communication link. Furthermore, SoC balance among batteries in the islanded microgrid could be realized. A distributed control strategy was proposed to achieve the balance of the energy state for the specific batteries system [12]. In [13], the distributed control strategy was improved to protect the batteries based on the SoC measurements. The accurate current sharing control considering the SoC among batteries was realized in [14]. However, the aforementioned studies all focused on the distributed control strategy under free communication. Cyber attacks on communication links among batteries were ignored, which resulted in the failure of control strategy. Thus, accurate current sharing control considering cyber attacks was necessary for the BESS in DC microgrids.
Cyber attacks on power systems include false data injection (FDI) attacks, denial of service (DoS) attacks, time-delay attacks, and resonance attacks [15]. Therein, FDI and DoS attacks are two typical cyber attacks in microgrids. FDI attacks are a kind of deception attack that manipulate information by injecting the false information into controller/sensor, and DoS attacks are a kind of disruption attack that destroy data availability by blocking the communication link. These attacks can lead to the performance degradation of the system and even cause the instability of systems [15]. Note that FDI attacks can be designed to target sensor, controller and energy markets [16]. The focus of this paper is on current sharing among batteries in secondary control. Thus, the FDI attacks are designed to inject the secondary controller in this paper.
On issues related to FDI attacks, numerous studies have focused on the detection and mitigation for DC microgrids in the secondary control [17,18,19,20]. In the study [17], a framework to carry out the detection by identifying a change in sets of inferred candidate invariant in DC microgrids was proposed. In order to solve the bi-level optimization problem, some new computationally efficient algorithms were proposed in the large-scale power systems [16]. A game algorithm based on the socially rational multi-agent system and fictitious play was proposed [21]. A method to signal temporal logic detection by monitoring the output voltages and currents of DC microgrids against the defined bounds was proposed [18]. In the study [19], a fully distributed control strategy based on detection strategy was proposed for DC microgrids in the presence of the two variants of false data injection into current sensor. Meanwhile, some scholars also designed resilient control strategies to eliminate the impact of FDI attacks on systems. In the study [22], a trust-based cooperative controller which only required local and neighbor information was proposed to mitigate the effects of attacks on communication links and controller hijacking. According to [23], a control strategy based on the neural network was proposed to compensate for a kind of unknown FDI attack signal. The event-driven resilient control based on a detection strategy was proposed to mitigate unknown boundary FDI attacks by designing a local authentication signal [24]. The output consensus control for the linear heterogeneous multi-agent against continuous FDI attacks was proposed by designing an auxiliary controller in [25].
Meanwhile, there were seldom works focused on the issues of DC microgrids related to DoS attacks [26]. A control strategy with event-based sampling under DoS attacks was proposed for linear multi-agent systems in [27]. Furthermore, a sample-data fully distributed consistency algorithm under DoS attacks was proposed in [28]. Different from the study in [27], it could be applied in linear heterogeneous multi-agent systems and the global information was not necessary. Furthermore, the event-trigged resilient control for DC microgrids under DoS attacks was proposed and the stability condition based on DoS frequency and DoS duration was established [29]; However, the control strategy for the BESS considering DoS and continuous FDI attacks was rarely studied.
Meanwhile, although the burden of communication can be reduced, calculations will increase, which could increase the burden of the controller and even system faults.
To sum up, this paper proposes a distributed output consensus control for the BESS considering disturbance items, DGs, CPLs, DoS, and FDI attacks. In order to further reduce the burden of communication, a fuzzy logic controller (FLC) is introduced in this paper.
The detailed contributions of this paper are shown as follows:
  • The model of the BESS in DC microgrids embedded with disturbance items, DGs, CPLs and resistive loads, is built in this paper. And it can be further transformed into linear heterogeneous multi-agent systems, which lays the foundation for the following control strategy.
  • The model of DoS and FDI attacks are built for this system. Different from previous literatures, the FDI is a kind of continuous attack in this paper. Based on this, the state-space function model of the BESS considering DoS and FDI attacks is further proposed.
  • To further reduce the burden of communication among batteries, the FLC is applied in this system.
  • Based on the proposed system model and the FLC, a new distributed fuzzy output consensus control strategy is proposed to realize accurate current sharing control among batteries in the presence of DoS and FDI attacks, which can extend the lifetime of the batteries and eliminate security risks.
The rest of this paper is organized as follows. The model of the BESS in DC microgrids embedded with disturbance items, DGs, CPLs and resistive loads, is built in Section 2. Furthermore, the models of DoS, FDI attacks, and the FLC are built in Section 3. Based on these, a new distributed fuzzy output consensus control strategy is proposed to realize accurate current sharing control among batteries in the presence of DoS and FDI attacks. Meanwhile, the system under the proposed control in different cases is analyzed. Then numerical simulation examples are provided to verify the feasibility of the proposed control strategy in Section 4. Meanwhile, the experiment results are described in Section 5. Finally, this paper is concluded in Section 6. The flowchat of the methodology is shown in Figure 1.

2. The Model of Battery Energy Storage Systems in DC Microgrids

As shown in Figure 2, the structure of the ith battery in DC microgrids is given. There are many DGs and CPLs in microgrids, and they can cause the fluctuation of bus voltage and even instability of system [30]. CPLs and DGs can be linearized at the voltage stable operation point  V , i  by the Taylor series expansion method [31].
And they are shown as follows:
I C P L , i = P C P L , i v C P L , i P C P L , i V , i P C P L , i V , i 2 v C P L , i V , i = I c p l , i + v C P L , i R C P L , i
I D G , i = P D G , i v D G , i P D G , i V , i + P D G , i V , i 2 v D G , i V , i = I d g , i + v D G , i R D G , i
where  I c p l , i = 2 P C P L , i / V , i  and  I d g , i = 2 P D G , i / V , i  represent the equivalent constant current loads regarding the  D G i  and the  C P L i , respectively.  R C P L , i = V , i 2 / P C P L , i  and  R D G , i = V , i 2 / P D G , i  represent the equivalent resistances which can undermine the stability of the system. The constant power value for the  C P L i  and the  D G i  are represented as  P C P L , i  and  P D G , i , respectively.  v D G , i  and  v C P L , i  are the input voltages. And there is  v = v D G , i = v C P L , i . Note that the CPLs refer to the power electronic load under the tightly control in this paper. Meanwhile, the disturbances from DGs are considered in this paper. And these disturbances are denoted as  Δ V t i R L i  represents the common resistive load in this system. By applying Kirchhoff’s current law and voltage law, the model of the ith battery is built and given by (3).
C f i d V i d t = I f i + j N i V j V i R i j V i R i I e q . i L f i d I f i d t = V 0 i + Δ V t i R f i I f i V i
where  V 0 i  and  I f i  are the output voltage and current of the ith battery, respectively.  R f i L f i C f i  are the RLC filter of the ith battery.  V i  is the point voltage of the ith battery. And  V j  is the point voltage of the jth battery.  R i j  is the power-line load between the ith battery and the jth battery.  R i = R C P L , i + R D G , i + R L i  represents the total resistive load in this system.  I e q , i = I c p l , i + I d g , i  represents the equivalent current load in this system.
Then let  x ¯ i ( t ) = V i , I f i T u ¯ i ( t ) = V 0 i ω ¯ i ( t ) = I e q , i , Δ V t i T y i ¯ ( t ) = n i I f i  where  n i = n 0 i I f i / SoC . Therein,  n 0 i  is the droop gain. In light of Equation (3), the state-space function of the ith battery in DC microgrids can be obtained as follows:
x ¯ ˙ i ( t ) = A ¯ i x ¯ i ( t ) + A ¯ i j ( x ¯ i ( t ) x ¯ j ( t ) ) + B ¯ i u ¯ i ( t ) + D ¯ 1 i ω ¯ i ( t ) y i ( t ) = C i ¯ x i ¯ ( t )
where  A ¯ i = 1 C f i R i 1 C f i 1 L f i R f i L f i A ¯ i j = 1 R i j C f i 0 0 0 B ¯ i = 0 1 L f i C ¯ i = 0 n i T D ¯ i = 1 C f i 0 0 1 L f i .
In order to provide stable output voltage and current, the plug and play (PnP) controller is applied as the zero controller, which is beneficial for the features of PnP regarding DGs and loads. And the detailed design of the PnP controller is shown as follows:
u ¯ i ( t ) = p i , 1 V i + p i , 2 I f i + p i , 3 0 t V r , i V i d t
where  p i , 1 p i , 2 p i , 3  are the control parameters of the PnP controller, and  V r , i  is the rate voltage. The system is asympototically stable, if the control parameters of the PnP controller meet the following conditions [32]:
p i , 1 < j N i 1 R i j + 1 R L i + 1 R C P L , i + 1 R D G , i ( R f i n i , 2 ) + 1
p i , 2 < L f i C f i j N i 1 R i j + 1 R L i + 1 R C P L , i + 1 R D G , i + R f i
p i , 3 0 , n i , 1 1 n i , 2 R f i L f i
The V-I droop controller is applied as the primary controller to realize voltage regulation and preliminary current sharing among batteries, and it is shown as follows:
V r , i = V n l n i I f i + Δ V i ( t )
where  V n l  is the no-load voltage of the ith battery in DC microgrids,  Δ V i ( t )  is the PI controller which is used to realize accurate current sharing among batteries in secondary control. The design of  Δ V i ( t )  is shown as follows:
Δ V i ( t ) = k P u i ( t ) + k I 0 t u i ( t ) d t
where  k P  and  k I  are coefficients of this PI controller,  u i ( t )  is the feedback controller to be designed in next section.
To sum up, the overall model of the BESS in DC microgrids can be obtained. In light of Equations (5), (9) and (10), there are:
u ¯ i ( t ) = P i 1 x ¯ i ( t ) + P i 2 z i ( t )
z ˙ i ( t ) = P i 3 x ¯ i ( t ) + V u l + Δ V i ( t )
ρ i ˙ ( t ) = k I u i ( t )
Δ V i ( t ) = k P u i ( t ) + ρ i ( t )
where  z i ( t ) = 0 t V r , i V i d t ρ i ( t ) = k I 0 t u i ( t ) d t P i 1 = p i , 1 , p i , 2 P i 2 = p i , 3 P i 3 = [ 1 , n i ] . Then set  x i ( t ) = [ x ¯ i T ( t ) , z i ( t ) T , ρ i ( t ) T ] T . Combining Equation (4), the overall space-state model of the BESS in DC microgrids is provided:
x i ( t ) = A i x i ( t ) + j N i A i j ( x i ( t ) x j ( t ) ) + B i u i ( t ) + D i ω i ( t ) y i ( t ) = C i x i ( t )
where  A i = A ¯ i + B ¯ i P i 1 B ¯ i P i 2 0 2 × 1 P i 3 0 1 0 1 × 2 0 0 ω i ( t ) = ω ¯ i ( t ) V B i = 0 2 × 1 k P k I C i = C ¯ i T 0 0 T A i j = A ¯ i j 0 2 × 1 0 2 × 1 0 1 × 2 0 0 0 1 × 2 0 0 D i = D ¯ 1 i 0 2 × 1 0 1 × 2 1 0 1 × 2 0 .
Meanwhile, the 0th battery is design as a leader for the secondary control. And the space-state function model of the 0th battery is provided as follows:
x ˙ 0 ( t ) = A 0 x 0 ( t ) + D 0 ω 0 ( t ) y 0 ( t ) = C 0 x 0 ( t )
Note that the  A 0  can be set by the Equation (16). And this equation have been described in detail in [11]. In addition, the interaction  j N i A i j ( x i ( t ) x j ( t ) )  can be incorporated into disturbance items according to [11]. Thus, the final space-state model of the BESS in DC microgrids is shown as follows:
x ˙ i ( t ) = A i x i ( t ) + B i u i ( t ) + D i ω i ( t ) y i ( t ) = C i x i ( t ) x ˙ 0 ( t ) = A 0 x 0 ( t ) + D 0 ω 0 ( t ) y 0 ( t ) = C 0 x 0 ( t )
Note that the Equation (17) is a standard linear heterogeneous multi-agent system with disturbance. For the linear heterogeneous multi-agent system (17), a common strategy is introduced, which lays the foundation for the following strategy [33]. And the common strategy is shown as follows:
η ˙ c , i ( t ) = A 0 η c , i ( t ) + F i [ j N i a i j ( η c , i ( t ) η c , j ( t ) + b i η c , i ( t ) x 0 ( t ) ] u c , i ( t ) = K i y i ( t ) C i Π i η c , i ( t ) + Γ i η c , i ( t )
where  K i  and  F i  are the control gains in the system. And  η c , i ( t )  is a compensator for ith battery that mainly transforms the information among batteries.  u c , i ( t )  is the output feedback controller, and there is  u i ( t ) = u c , i ( t )  for this common strategy.
The communication among N batteries is represented by a directed graph  G = ( A , V ¯ , E ) V ¯ = V { v 0 }  with  V = { v 1 , v 2 , v 3 , , v N }  represents N battery and 0th battery.  E V × V  with  v i , v j E  represents that there is a path from the ith battery to the jth battery. In the adjacency matrix  A = a i j R N × N  for the graph,  a i j > 0  if  v i , v j E , otherwise  a i j = 0 L = { l i j } R N × N  represents the Laplace matrix and if  i = j  there is  l i j = j N i a i j  , otherwise  l i j = a i j . The adjacency matrix  B = d i a g { b 1 , b 2 , b 3 , , b N }  between the leader and followers is defined as  b i = 1  if the ith battery can receive information from the leader,  b i = 0  otherwise. Finally, let  H = L + B .
From the above analysis, the accurate current sharing is realized if and only if  p 0 I f 0 = p 1 I f 1 = = p N I f N , that is  y 0 = y 1 = = y N . Note that it has been transformed into the output consensus control. Thus, the purpose of the proposed control strategy is essentially to realize  lim t y i ( t ) y 0 ( t ) = 0 i = 1 , 2 , , N . Before that, these conditions should be met in order to realize the output consensus control:
(1)
The communication system has at least one directed spanning tree path from the leader to each follower;
(2)
The following equations have at least one solution:
Π i A 0 = A i Π i + B i Γ i 0 = C i Π i C 0 , i = 1 , 2 , 3 , , N
where  Π i R 4 × 4 Γ i R 1 × 4 ;
(3)
The disturbances  ω i ( t ) ω 0 ( t )  should meet the following conditions:
lim T 1 T 0 T ω i ( t ) 2 d t < lim T 1 T 0 T ω 0 ( t ) 2 d t <

3. Current Sharing Fuzzy Control Strategy Considering Multiple Network Attacks

In this section, the models of DoS and FDI attacks are introduced, respectively. Then the FLC is applied to further reduce the burden of communication among batteries. Based on these, the space-state function of the BESS considering DoS and FDI attacks is built. Furthermore, a distributed fuzzy control strategy considering multiple cyber attacks is proposed in this section. And the system under the proposed control law is analyzed in different cases.

3.1. The Model of FDI Attacks

FDI attacks are a kind of deception attack that inject false data into controllers and/or sensors to prevent realizing the control goal [25,34]. Meanwhile, these false data are injected continuously into controllers in this paper.
The model of controller considering FDI attacks is shown as follows:
u i a = u i + μ i a
where  μ i a  is the injected data,  u i a  is the damaged controller for the ith battery.
Note that the information is only changed in the corresponding controller. The output feedback controller is applied in this paper. Thus, the output of the system considering FDI attacks is given as:
y i a = y i + s i a
where  s i a  is the injected data,  y i a  is the damaged output information for the ith battery.
Meanwhile, the following assumptions should be met for FDI attacks:
(a)
The injected false data are bounded.
(b)
The FDI attacks are mainly compound attacks consisting of bias attacks and harmonic attacks.
Based on this, the space-state function of the BESS in DC microgrids under the DoS and FDI attacks is further built:
x ˙ i ( t ) = A i x i ( t ) + B i u i a ( t ) + D i ω i ( t ) y i ( t ) = C i x i ( t ) x ˙ 0 ( t ) = A 0 x 0 ( t ) + D 0 ω 0 ( t ) y 0 ( t ) = C 0 x 0 ( t )
Remark 1. 
Actually, the attack emitters often operate with a limited supply of energy. Thus, the injected false data are bounded due to limited energy of attacks. Based on Equation (23), the bias attacks or the harmonic attacks could be regarded as disturbances because the space function of this system contains disturbance items. Therefore, the control goal could still be realized in the presence of this FDI attack. However, compound attacks could easily cause the failure of control goal according to [25]. For attackers, the compound attacks are the most effective means. Thus, the FDI attacks are mainly compound attacks.

3.2. Modeling of DoS Attacks

For this system, each battery exchanges information with its neighbors through the communication link so as to realize the control goal. However, the communication link is often attacked by certain cyber attacks due to the open setting [34]. Therein, DoS attacks are a kind of prevalent attack in cyber attacks. DoS attacks mainly prevent the exchange information among batteries by blocking the communication link, and this causes the failure of the control strategy. Meanwhile, in order to ensure the universality of the model, DoS attacks are aperiodic in this paper.
And the attack moment and the duration of DoS attacks are represented as the  { t d } ( d = 1 , 2 , )  and  Δ d , respectively. Thus, the time period during DoS attacks is represented as  ( t d , t d + Δ d ) , and the next time period should meet  t d + 1 > t d + Δ d . The sum time of DoS attacks in  [ 0 , t ]  is  Ξ d ( 0 , t ) = U d = 1 , 2 ( t d , t d + Δ d ) [ 0 , t ] . Moreover, the successful probability of DoS attacks is given as follows [35]:
Prob { ϑ ( t ) = 0 } = E { ϑ ( t ) } = 1 d Prob { ϑ ( t ) = 1 } = 1 E { ϑ ( t ) } = d
where  d [ 0 , 1 ] ϑ ( t )  is a detector of DoS attacks with  ϑ ( t ) = 0  if  t Ξ ( 0 , t )  and with  ϑ ( t ) = 1  if  t Ξ d ( 0 , t ) . The communication time among batteries is  Ξ ( 0 , t ) = [ 0 , t ] / Ξ d ( 0 , t ) . The total number of DoS attacks is M, and the frequency of DoS attacks can be defined as:
f = M t
| Ξ d ( 0 , t ) |  is the total length of DoS attacks, the attacks ratio in  [ 0 , t ]  can be defined as
α = | Ξ d ( 0 , t ) | t
Meanwhile, the following assumptions should be met for DoS attacks:
(i)
The number of DoS attacks is limited, and the duration of each DoS has the upper limit.
(ii)
The controllers and state values are no longer updated in the presence of DoS attacks.
(iii)
Every DoS attack can be detected.
Remark 2. 
As a kind of cyber attack, DoS attacks need the carrier to provide the energy. Moreover, the carriers have the limit of this energy supply. Thus, the condition (i) is reasonable.
Remark 3. 
Although the ith battery has the ability to communicate during DoS attacks, the availability of data is violated [28]. Based on this, the controllers and state values are no longer updated in order to make data reliable.
Remark 4. 
Note that the detection of DoS attacks have been widely studied [36]. Thus, condition (iii) is satisfied.

3.3. Design of the Fuzzy Logic Controller

Next, an FLC is designed to improve the dynamic performance and reduce the burden of communication among batteries by minimizing unnecessary information exchange.
The FLC transforms logic judgment strategies based on human rich experience into applicable control strategies to controllers. And since there is no need to know the detailed mathematical description of the system, it has been widely studied [37]. Thus, the FLC is applied in this paper.
The processing of the FLC can be divided into three parts: fuzzification, regularization of logic inference, and defuzzification. In fuzzification, the main task is to collect and transform the input data into a fuzzy set by fuzzy linguistic terms and membership functions. A set of fuzzy rules for logical reasoning is introduced in second part, where the fuzzy rules can be described by simple IF–THEN. In the third part, the fuzzy output is mapped to a clear output by the membership function. And the common methods are the center of gravity method and maximum membership method. Herein, the center of gravity method is applied in this paper.
Based on above analysis, the FLC is introduced to reduce the burden of communication among batteries by judging whether the system needs to update or not based on the  Δ y i ( t )  and d. Note that  Δ y i ( t ) = | C i x ˙ i ( t ) |  represents the variation of output. Therein, there is  Δ y i ( t ) [ 0 , h i ] , where  h i  is the upper limited. The FLC is shown in Figure 3.
The FLC has three input membership functions for  Δ y i ( t ) : small (S), medium (M), big (B). For d, there are two membership functions: small (S), big (B). The output has three membership functions: positive small (PS), positive medium (PM), positive big (PB). And the fuzzy rules are shown in Table 1.

3.4. Current Sharing Fuzzy Control Strategy in the Presence of FDI and DoS Attacks

Next, a current sharing fuzzy control strategy considering FDI and DoS attacks is proposed in this section. And the system under the proposed control strategy is analyzed in different cases. Before that, the current sharing control without FLC is proposed:
η ˙ i ( t ) = A 0 η i ( t ) + F i j N i a i j η ^ i j ( t ) + b i η ^ i 0 u i ( t ) = K i y ^ i a ( t ) + Γ i η i ( t ) + z i ( t ) z ˙ i ( t ) = ι i K i ( y i d y r e f , i ) ι i z i ( t )
where  η ^ i j = ( 1 ϑ ( t ) ) η i ( t ) η j ( t ) + ϑ ( t ) η i ( t d ) η j ( t d ) η ^ i 0 = ( 1 ϑ ( t ) ) η i ( t ) x 0 ( t ) + ϑ ( t ) η i ( t d ) x 0 ( t ) y ^ i a ( t ) = ( 1 ϑ ( t ) ) y i a ( t ) C i Π i η i ( t ) + ϑ ( t ) y i a ( t ) C i Π i η i ( t d ) . Therein,  z i ( t )  is a proposed auxiliary controller which is designed to mitigate the impact of FDI attacks, and  ι i  is a given parameter.
Meanwhile, a reference model for each battery is introduced without FDI attacks. And it is shown as follows:
x ˙ r e f , i ( t ) = A i x r e f , i ( t ) + B i u ^ r e f , i ( t ) + D i ω i ( t ) y r e f , i ( t ) = C i x r e f , i ( t ) u ^ r e f , i ( t ) = K i y ^ r e f , i ( t ) C i Π i η i ( t ) + Γ i η i ( t )
where  y ^ r e f , i ( t ) = ( 1 ϑ ( t ) ) y r e f , i ( t ) C i Π i η i ( t ) + ϑ ( t ) y r e f , i ( t ) C i Π i η i ( t d ) .
From the above descriptions, the rules for this system can be obtained as follows. Rule 1: if  Δ y i ( t )  is S then  τ i  is PS. Rule 2: if  Δ y i ( t )  is M, B, and d is B then  τ i  is PB. Rule 3: if  Δ y i ( t )  is M, B, and d is S then  τ i  is PM. Note that the output of the FLC is represented by  τ i , whose value ranges between 0 and (1 +  h i ). The control law is proposed as follows, and  τ i  can be incorporated into the control law (27):
u i ( t ) = 1 2 β i , 1 u ^ i ( t ) + β i , 2 u ^ i ( t ) η ˙ i ( t ) = 1 2 β i , 1 η ^ ˙ i ( t ) + β i , 2 η ^ ˙ i ( t ) u ^ i ( t ) = K i y ^ i a ( t ) + Γ i η ^ i ( t ) + z i ( t ) η ^ ˙ i ( t ) = A 0 η ^ i ( t ) + F i j N i a i j η ^ i j ( t ) + b i η ^ i 0 z ˙ i ( t ) = ι i K i ( y i d y r e f , i ) ι i z i ( t )
where  m i  is the dividing value of the FLC between PS and PM,  β i , 1 =  sign ( τ i m i ) + 1  and  β i , 2 =  sign ( m i τ i ) + 1 . Note that sign ( · )  is the symbolic function. Finally, the current sharing fuzzy control strategy (29) is proposed.
Based on this, the following cases could be defined: case 1 if the  ( τ i m i )  is negative, and case 2 if the  ( τ i m i )  is positive. Therein, case 1 includes Rule 1, and case 2 includes Rule 2 and Rule 3.

3.4.1. Case 1

In case 1, there are  β i , 2 = 2  and  β i , 1 = 0 . The control law (29) is rewritten as:
u i ( t ) = u ^ i ( t ) η ˙ i ( t ) = η ^ ˙ i ( t )
The system is not updated in this case since  Δ y i ( t )  is S. If the output of ith battery changes very little, it will not affect the output consensus of the system even if controllers is not updated. It is regarded as the unnecessary information in this case. Thus, the burden of communication is reduced by minimizing unnecessary information exchange.

3.4.2. Case 2

In this case,  β i , 2 = 0 β i , 1 = 2 , the control law (29) is rewritten as:
u i ( t ) = u ^ i ( t ) η ˙ i ( t ) = η ^ ˙ i ( t )
If the d is B, it represents the higher successful probability of DoS attacks, and it can be regarded that the DoS attack occurs in this situation. Thus,  ϑ ( t )  should be reset to  ϑ ( t ) = 0  if the d is S, and  ϑ ( t ) = 1  if the d is B in this case. Meanwhile, the system needs to update so as to realize the current sharing control when  Δ y i ( t )  is M, B. In other words, the accurate current sharing control among batteries in this case is transformed into the current sharing control of the system (23) considering FDI and DoS attacks under the control law (31). Note that the continuous updating of information is also unnecessary if  Δ y i ( t )  is between PS and PM. And it can be solved by adjusting  m i . Then, the detail of choosing  K i  and  F i  is shown as follows.
The  F i  can be chosen by the following algebraic Riccati equation [25,38]:
A i T M i + M i A i + X i M i T i 1 M i = 0
where  M i  is the symmetric positive matrix,  F i = γ i T i 1 M i X i  > 0 and  T i  > 0. Note that  γ i 1 / 2 λ ¯ m i n  and  λ ¯  = min(ReH). Next, the solution of  K i  is given. Meanwhile, it is proved that the BESS in DC microgrids could realized the output consensus under the control law (31).
Before that, the current sharing among batteries is defined:
Definition 1. 
For the performance metric  γ i , if the system (23) meets the following conditions, it can be said that the system realizes the  H  consensus, i.e., accurate current sharing control under the corresponding controller [33]:
(i)
If  ω 1 i ( t ) = ω 0 ( t ) 0 i = 1 , 2 , 3 , N ; then this is true for any initial value
lim t x i ( t ) Π i η i ( t ) = 0 lim t η i ( t ) x 0 ( t ) = 0
combine Equation (19), we can obtain
lim t y i ( t ) y 0 ( t ) = 0
(ii)
If the initial values of the state variables for the leader, followers and compensators are 0, and the disturbance are limited, then the following holds:
1 T Y ( t ) < 1 T γ 2 W ( t ) , T > 0
where
Y ( t ) = 0 T t = 1 N y i ( t ) y 0 ( t ) d t W ( t ) = 0 T i = 1 N ω i ( t ) + ω 0 ( t ) d t
Theorem 1. 
The conditions for the system (23) to realize the output consensus under the control law (31) with  ι i , are shown as follows: Given some symmetric positive matrices  P i  and  R i , and scalar  ι i  > 0 satisfy the following conditions:
( A i ) T P i + P i A i + C i T C i P i P i B i P i ι i I 0 B i T P i 0 R i < 0
where  A i = A i + B i K i C i  and  K i C i = R i 1 B i T P i .
Proof. 
Let  x Δ i = x i x r e f , i . Then, combining Equations (23), (27) and (28), there is
x ˙ Δ i = x ˙ i x ˙ r e f , i = A i x i + B i u i a + D i ω i ( A i x r e f , i + B i u r e f , i + D i ω i ) = ( A i + B i K i C i ) x Δ i + B i ( z i + f i 0 ) = A i x Δ i + B i z ¯ i
where  f i 0 = K i s i a + μ i a  and  z ¯ i = z i + f i 0 , and the  z i  is rewritten as
z ˙ i = ι i K i ( y i d y r e f , i ) ι i z i ( t ) = ι i K i ( y i y r e f , i + s i a ) ι i z i ( t ) = ι i K i ( C i x i C i x r e f , i + s i a ) ι i z i ( t ) = ι i K i C i x Δ i ι i ( z i ( t ) + K i s i a )
where  f i 1 = K i s i a f i 0 . Define the Lyapunov function candidate
V i = x Δ i T P i x Δ i + ι i 1 z ¯ i T R i z ¯ i
Combining  K i C i = R i 1 B i T P i , Equations (36) and (37), the derivative of  V i  is shown as follows:
V ˙ i = x ˙ Δ i T P i x Δ i + x Δ i T P i x ˙ Δ i + ι i 1 z ¯ ˙ i T R i z ¯ i + ι i 1 z ¯ i T R i z ¯ ˙ i = ( A i x Δ i + B i z ¯ i ) T P i x Δ i + x Δ i T P i ( A i x Δ i + B i z ¯ i ) + ι i 1 ( ι i K i C i x Δ i ι i z ¯ i ( t ) ι i f i 1 + + f i 0 ) T R i z ¯ i + ι i 1 z ¯ i T R i ( ι i K i C i x Δ i ι i z ¯ i ( t ) ι i f i 1 + f i 0 ) = x Δ i T ( ( A i ) T P i + P i A i ) x Δ i 2 z ¯ i T R i z ¯ i 2 z ¯ i T R i ( f i 1 ι i 1 f i 0 ) x Δ i T ( ( A i ) T P i + P i A i + P i T P i ι i ) x Δ i 2 z ¯ i T R i z ¯ i 2 z ¯ i T R i ( f i 1 ι i 1 f i 0 )
From Equation (35), there is
V ˙ i x Δ i T ( ( A i ) T P i + P i A i + P i T P i ι i ) x Δ i 2 z ¯ i T R i z ¯ i 2 z ¯ i T R i ( f i 1 ι i 1 f i 0 ) x Δ i T ( C i T C i + P i B i R i 1 B i T P i ) x Δ i 2 z ¯ i T R i z ¯ i 2 z ¯ i T R i ( f i 1 ι i 1 f i 0 ) x Δ i T ( C i T C i ) x Δ i x Δ i T ( P i B i R i 1 ( B i P i ) T ) x Δ i 2 z ¯ i T R i z ¯ i 2 z ¯ i T R i ( f i 1 ι i 1 f i 0 )
And, it can have
V ˙ i x Δ i T ( C i T C i ) x Δ i 2 z ¯ i T R i z ¯ i 2 z ¯ i T R i ( f i 1 ι i 1 f i 0 )
Then, using Young inequality, the following equality can be obtained:
V ˙ x Δ i T ( C i T C i ) x Δ i + ( f i 1 ι i 1 f i 0 ) T R i ( f i 1 ι i 1 f i 0 )
Thus, according to [25], there is  V ˙ i < 0  if
| | x Δ i | | 2 > λ m a x ( R i ) λ m i n ( C i T C i ) | | f i 1 ι i 1 f i 0 | | 2
Hence, there is a small parameter  δ i  that makes  lim t | | x Δ i | | 2 δ i . And  δ i  could be chosen by adjusting  R i  and  ι i . According to [28,39], it can obtain that  lim t x r e f , i ( t ) Π i η i ( t ) = 0  and  lim t η i ( t ) x 0 ( t ) = 0 . Furthermore, there are  lim t x i ( t ) Π i η i ( t ) δ i  and  lim t η i ( t ) x 0 ( t ) = 0 , i.e.,  lim t y i ( t ) y 0 ( t ) δ i . Thus, the output consensus can be realized by adjusting  δ i . Note that the (35) can be solved by the LMI toobox in a MATLAB software environment.
This completes the proof. □
Remark 5. 
The control strategy considering DoS attacks has been widely studied [28,39]. Note that the system (23) is almost same as the system (17) by desiging the  z i ( t )  [25]. According to the [28], the state information of controllers among batteries is replaced with the most recent available data based on the common strategy (18).

4. Simulation

In order to verify the feasibility of the proposed strategy in the presence of DoS and FDI attacks, simulation examples are provided in MATLAB environment, where four batteries systems and one leader system are considered in the BESS.
And the relevant communication topology is shown in Figure 4. The detailed parameters are shown as follows. The line parameters among batteries are selected:  R 14 = 0.20 Ω R 41 = 0.20 Ω R 12 = 0.40 Ω R 21 = 0.40 Ω R 32 = 0.20 Ω R 23 = 0.20 Ω R 34 = 0.50 Ω R 43 = 0.50 Ω R 01 = 1.00 Ω R 10 = 1.00 Ω . And the resistive loads are selected:  R L 0 = 2.00 Ω R L 1 = 1.30 Ω R L 2 = 2.30 Ω R L 3 = 1.30 Ω R L 4 = 2.30 Ω . For the parameters of the RLC filter, they are shown as follows:
R f 0 = 0.50 Ω , L f 0 = 2 mH , C f 0 = 1.00 mF R f 1 = 0.50 Ω , L f 1 = 1 mH , C f 1 = 0.66 mF R f 2 = 0.40 Ω , L f 2 = 2 mH , C f 2 = 0.33 mF R f 3 = 0.50 Ω , L f 3 = 1 mH , C f 3 = 0.66 mF R f 4 = 0.25 Ω , L f 3 = 3 mH , C f 4 = 0.33 mF
The relevant parameters of the V-I droop controller are  k P = 1.5  and  k I = 3 . The capacities of the DGs and CPLs are  P D G , i = P C P L , i = 200 W , i = 1 , 2 , 3 , 4 . The rated voltage of the DC microgrid is 50 V, and the disturbance from DGs can be selected 10% DC voltage fluctuation. At the beginning, the SoC of each battery is 90%, and the ratio of rated capacities of these five batteries included one leader and four batteries is chosen as 2:1:2:1:2. The parameters of the PnP controller are shown as follows:
p 0 , 1 = 1.00 , p 0 , 2 = 3.50 , p 0 , 3 = 2.00 p 1 , 1 = 3.00 , p 1 , 2 = 2.00 , p 1 , 3 = 2.00 p 2 , 1 = 3.00 , p 2 , 2 = 5.60 , p 2 , 3 = 2.00 p 3 , 1 = 1.00 , p 3 , 2 = 1.25 , p 3 , 3 = 1.00 p 4 , 1 = 2.00 , p 4 , 2 = 5.00 , p 4 , 3 = 1.50
Meanwhile, the Equation (32) is a algebraic Riccati equation, it can be solved in the MATLAB. Thus, based on Equation (32), the controller gain  F i  = [−6.0,−6.0,−6.0,−6.0;−6.0, −6.0,−6.0,−6.0;−6.0,−6.0,−6.0,−6.0;−6.0,−6.0,−6.0,−6.0] can be obtained. Then the output feedback controller gain can be obtained from Equation (35) by the LMI toolbox in MATLAB. Therein,  K 1 = 2.83 K 2 = 2.75 K 3 = 1.74  and  K 4 = 1.70 .
As for network attacks, there are  t d  = 1 s, 3 s, 5 s,  α  = 20%, f = 0.2 Hz,  Δ d  = 0.5 s, 1 s, 1.5 s for DoS attacks. Meanwhile, FDI attacks are selected as follows:  s 1 a = 2 + sin ( 0.1 t ) s 2 a = 2 + sin ( 0.1 t ) s 3 a = sin ( 2 t )  and  s 4 a = 0 . For the parameters of the auxiliary controller, there are  ι 1 = 25 ι 2 = 35 ι 3 = 35  and  ι 4 = 0 .
The output of the system under the control law (18) in the idea environment is shown in Figure 5. From it, it can be found that the system could realize the accurate current sharing control among batteries under the control law (18) without cyber attacks. However, the outputs of the system in the presence of cyber attacks such as DoS attacks, FDI attacks, or a mixture of the two, are shown in Figure 5b–d. It is clear that FDI attacks prevent the output consensus of 1st battery and 2nd battery. Therein, FDI attacks for 3rd battery are the harmonic attacks, and this system still can realize output consensus. For 1st and 2nd battery, FDI attacks are the compound attacks, and they cannot realize the output consensus. Meanwhile, it can be found that DoS attacks make the system no update. These are consistent with the assumptions of cyber attacks. Based on this, the auxiliary controller is introduced in equation (27). The output of this system considering DoS and FDI attacks under the control law (27) is shown in Figure 6. As can be seen from the Figure 6a,b, this system realizes the output consensus, i.e., accurate current sharing among batteries, even if there are multiple cyber attacks in this system. The feasibility of this control law (27) is proved.
However, this control law (27) does not take into account the burden of communication among batteries. In order to reduce the burden of communication among batteries, the FLC is applied in the BESS.
For the FLC, the parameters of membership functions are shown as follows. Note that the main task is to verify the feasibility, so the membership can be simply set in Figure 7. Therein,  h i = 1  and  m 1 = m 2 = 0.48 m 3 = m 4 = 1.33 . Based on Equation (24), the memberships of the d could be set as triangular membership functions. For the membership function of  Δ y i ( t )  in PS, it can be considered as an unnecessary update if  Δ y i ( t ) < 0.02 . The influence of updates on the system becomes increasingly significant with increasing values of  Δ y i ( t ) . Based on this, the membership of  Δ y i ( t )  is set as a trapezoidal function. Similarly, the other membership functions can be set as trapezoidal functions.
The output of the system under the control law (29) is shown in Figure 8a. Meanwhile, the events are shown in Figure 8b, which represent the update of the controller.
Furthermore, in order to highlight the advantages of the proposed control strategy (29), the comparison simulation results are shown in Table 2. Different from the common output consensus strategy in [33], the proposed control strategy is a kind of resilient control against the cyber attacks. Meanwhile, compared with [28] and [25], this control strategy could realize the output consensus control for the system under DoS and FDI attacks. Moreover, the burden of communication among batteries is reduced by applying the FLC, which is beneficial to the increasing scale of the BESS. Meanwhile, compared with event-triggered control, the proposed control strategy only needs to set the FLC without complex arithmetic. To sum up, the feasibility of the proposed control strategy is proved.

5. Experiment Results

In this section, the controller hardware-in-the-loop (CHIL) experiment is carried out to further verify the accurate current sharing for the BESS under the proposed control strategy via the StarSim HIL real-time simulator. In this experiment, the control strategy for four inverters are considered in the DSP (TMS320F28335) controller when the other parts of the system are simulated in the StarSim HIL real-time simulator. This is shown in Figure 9. The line parameters are selected as  R 01 = 1.00 Ω , R 12 = 0.40 Ω , R 23 = 0.20 Ω , R 30 = 0.50 Ω . The resistive loads are shown as  R L 0 = 1.30 Ω , R L 1 = 2.30 Ω , R L 2 = 1.30 Ω , R L 3 = 2.30 Ω . For the PnP controller, the relevant parameters are shown as  p 0 , 1 = p 2 , 1 = 1.00 p 1 , 1 = p 3 , 1 = 3.00 p 0 , 2 = p 2 , 2 = 3.50 p 1 , 2 = p 3 , 2 = 5.60 p 0 , 3 = p 1 , 3 = p 2 , 3 = p 3 , 3 = 2.00 . The parameters of PI controller are shown as  k P = 1.5 , k I = 3 . At the beginning, the SoC of each battery is 90%, and the ratio of rated capacities of these four batteries is chosen as 2:2:1:1. The droop gains of each agent are shown as  n 0 = n 1 = 0.03 n 2 = n 3 = 0.06 . And the other parameters are the same as the part of simulations in Section 4.
Based on this, the experiment is texted via the StarSim HIL simulator. Meanwhile, in order to better show the performance of proposed strategy, the time of this system is selected as [0 s, 25 s]. And the control strategy in [28] and proposed control strategy (29) are applied, separately. Before t = 10 s, this system applies the control strategy in [28]. After that, the proposed control strategy is applied. The output current is shown in Figure 10. Before 10 s, the output current sharing is not realized due to the cyber attacks. After that, the output current sharing is achieved by applying the proposed control strategy. Moreover, according to  y i ¯ ( t ) = n i I f i  where  n i = n 0 i / S o C , there is  I f i = 1 n i  when the outputs of each agent achieve the output consensus, i.e., the current sharing among batteries. Thus, the output current of each agent should meet  2 : 2 : 1 : 1 . As shown in Figure 10, the output currents are  24 A , 24 A , 12 A , and  12 A , separately. The performance of the proposed strategy is verified.

6. Conclusions

Sine DGs have been widely applied in DC microgrids, the BESS have been widely applied to compensate the power imbalance between DGs and loads. However, the impact of disturbance, DGs, CPLs and cyber attacks on this system have not been simultaneously considered. Thus, a distributed control strategy is proposed in this paper, which could realize the accurate current sharing and operate normally in the presence of multiple cyber attacks. Compared with the previous literature, this paper has the following contributions:
  • The whole model of the BESS in DC microgrids embedded into disturbance items, DGs, CPLs, and resistive loads, has been built in this paper. Furthermore, it can be further transformed into the linear heterogeneous multi-agent system, which lays the foundation for the following control strategy.
  • The model of DoS and FDI attacks for this system have been built. Different from previous literatures, the FDI attacks are a kind of continuous attack in this paper. Based on this, the state-space function model considering DoS and FDI attacks has been built.
  • To further reduce the burden of communication among batteries, the FLC has been applied in this system.
  • Based on the proposed system model and the FLC, a new distributed fuzzy output consensus control strategy is proposed to realize accurate current sharing control among batteries in the presence of DoS and FDI attacks.
Compared with the literature [25,33], the accurate current sharing among batteries in the presence of DoS and FDI attacks has been realized and the burden of communication has also been further reduced by applying the FLC. Finally, the numerical simulation examples have been provided to verify the feasibility of the proposed control strategy.

Author Contributions

Methodology, X.T.; Software, S.Z.; Validation, X.T.; Investigation, B.H.; Resources, W.W.; Writing—original draft, X.T.; Writing—review & editing, L.Z. and R.W.; Project administration, R.W. All authors have read and agreed to the published version of the manuscript.

Funding

This work is supported by the National Natural Science Foundation of China under Grant 52307194, in part by the Young Elite Scientists Sponsorship Program by CAST under Grant YESS20230026, in part by the Guangdong Basic and Applied Basic Research Foundation under Grant 2021A1515110915, in part by the Fundamental Research Funds for the Central Universities in China under Grant N2204014, Liaoning Provincial Science and Technology Program-Natural Science Foundation of the Department of Science and Technology under Grant 2023-BS-056 (Corresponding authors: Rui Wang).

Data Availability Statement

Data are contained within the article.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Ma, D.; Hu, X.; Zhang, H.; Sun, Q.; Xie, X. A Hierarchical Event Detection Method Based on Spectral Theory of Multidimensional Matrix for Power System. IEEE Trans. Syst. Man Cybern. Syst. 2021, 51, 2173–2186. [Google Scholar] [CrossRef]
  2. Wang, R.; Sun, Q.; Hu, W.; Xiao, J.; Zhang, H.; Wang, P. Stability-Oriented Droop Coefficients Region Identification for Inverters Within Weak Grid: An Impedance-Based Approach. IEEE Trans. Syst. Man Cybern. Syst. 2021, 51, 2258–2268. [Google Scholar] [CrossRef]
  3. Rey, J.M.; Rosero, C.X.; Velasco, M.; Martí, P.; Miret, J.; Castilla, M. Local Frequency Restoration for Droop-Controlled Parallel Inverters in Islanded Microgrids. IEEE Trans. Energy Convers. 2019, 34, 1232–1241. [Google Scholar] [CrossRef]
  4. Potty, K.A.; Bauer, E.; Li, H.; Wang, J. Smart Resistor: Stabilization of DC Microgrids Containing Constant Power Loads Using High-Bandwidth Power Converters and Energy Storage. IEEE Trans. Power Electron. 2020, 35, 957–967. [Google Scholar] [CrossRef]
  5. Xu, Q.; Jiang, W.; Blaabjerg, F.; Zhang, C.; Zhang, X.; Fernando, T. Backstepping Control for Large Signal Stability of High Boost Ratio Interleaved Converter Interfaced DC Microgrids With Constant Power Loads. IEEE Trans. Power Electron. 2020, 35, 5397–5407. [Google Scholar] [CrossRef]
  6. Mukherjee, N.; De, D. A New State-of-Charge Control Derivation Method for Hybrid Battery Type Integration. IEEE Trans. Energy Convers. 2017, 32, 866–875. [Google Scholar] [CrossRef]
  7. Wang, R.; Sun, Q.; Han, J.; Zhou, J.; Hu, W.; Zhang, H.; Wang, P. Energy-Management Strategy of Battery Energy Storage Systems in DC Microgrids: A Distributed Dynamic Event-Triggered H Consensus Control. IEEE Trans. Syst. Man Cybern. Syst. 2022, 52, 5692–5701. [Google Scholar] [CrossRef]
  8. Marroyo, L.; Sanchis, P.; Urtasun, A. State-of-charge-based droop control for stand-alone AC supply systems with distributed energy storage. Energy Convers. Manag. 2015, 106, 709–720. [Google Scholar] [CrossRef]
  9. Wang, R.; Sun, Q.; Ma, D.; Liu, Z. The Small-Signal Stability Analysis of the Droop-Controlled Converter in Electromagnetic Timescale. IEEE Trans. Sustain. Energy 2019, 10, 1459–1469. [Google Scholar] [CrossRef]
  10. Huang, W.; Abu Qahouq, J.A. Energy Sharing Control Scheme for State-of-Charge Balancing of Distributed Battery Energy Storage System. IEEE Trans. Ind. Electron. 2015, 62, 2764–2776. [Google Scholar] [CrossRef]
  11. Zhou, J.; Xu, Y.; Sun, H.; Wang, L.; Chow, M.Y. Distributed Event-Triggered H Consensus Based Current Sharing Control of DC Microgrids Considering Uncertainties. IEEE Trans. Ind. Inform. 2020, 16, 7413–7425. [Google Scholar] [CrossRef]
  12. Morstyn, T.; Hredzak, B.; Agelidis, V.G. Distributed Cooperative Control of Microgrid Storage. IEEE Trans. Power Syst. 2015, 30, 2780–2789. [Google Scholar] [CrossRef]
  13. Cai, H.; Hu, G. Distributed Control Scheme for Package-Level State-of-Charge Balancing of Grid-Connected Battery Energy Storage System. IEEE Trans. Ind. Inform. 2016, 12, 1919–1929. [Google Scholar] [CrossRef]
  14. Hoang, K.D.; Lee, H.H. Accurate Power Sharing With Balanced Battery State of Charge in Distributed DC Microgrid. IEEE Trans. Ind. Electron. 2019, 66, 1883–1893. [Google Scholar] [CrossRef]
  15. Chen, X.; Hu, S.; Li, Y.; Yue, D.; Dou, C.; Ding, L. Co-estimation of state and FDI attacks and attack compensation control for multi-area load frequency control systems under FDI and DoS attacks. IEEE Trans. Smart Grid 2022, 13, 2357–2368. [Google Scholar] [CrossRef]
  16. Chu, Z.; Zhang, J.; Kosut, O.; Sankar, L. Vulnerability Assessment of Large-scale Power Systems to False Data Injection Attacks. In Proceedings of the 2020 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm), Tempe, AZ, USA, 11–13 November 2020. [Google Scholar]
  17. Beg, O.A.; Johnson, T.T.; Davoudi, A. Detection of False-Data Injection Attacks in Cyber-Physical DC Microgrids. IEEE Trans. Ind. Inform. 2017, 13, 2693–2703. [Google Scholar] [CrossRef]
  18. Beg, O.A.; Nguyen, L.V.; Johnson, T.T.; Davoudi, A. Signal Temporal Logic-Based Attack Detection in DC Microgrids. IEEE Trans. Smart Grid 2019, 10, 3585–3595. [Google Scholar] [CrossRef]
  19. Sahoo, S.; Peng, J.C.H.; Devakumar, A.; Mishra, S.; Dragičević, T. On Detection of False Data in Cooperative DC Microgrids—A Discordant Element Approach. IEEE Trans. Ind. Electron. 2020, 67, 6562–6571. [Google Scholar] [CrossRef]
  20. Gallo, A.J.; Turan, M.S.; Boem, F.; Parisini, T.; Ferrari-Trecate, G. A Distributed Cyber-Attack Detection Scheme With Application to DC Microgrids. IEEE Trans. Autom. Control 2020, 65, 3800–3815. [Google Scholar] [CrossRef]
  21. Bompard, E.; Napoli, R.; Xue, F. Vulnerability of interconnected power systems to malicious attacks under limited information. Eur. Trans. Electr. Power 2013, 18, 820–834. [Google Scholar] [CrossRef]
  22. Abhinav, S.; Modares, H.; Lewis, F.L.; Davoudi, A. Resilient Cooperative Control of DC Microgrids. IEEE Trans. Smart Grid 2019, 10, 1083–1085. [Google Scholar] [CrossRef]
  23. Habibi, M.R.; Baghaee, H.R.; Dragičević, T.; Blaabjerg, F. False data injection cyber-attacks mitigation in parallel DC/DC converters based on artificial neural networks. IEEE Trans. Circuits Syst. II Express Briefs 2020, 68, 717–721. [Google Scholar] [CrossRef]
  24. Sahoo, S.; Dragičević, T.; Blaabjerg, F. An event-driven resilient control strategy for dc microgrids. IEEE Trans. Power Electron. 2020, 35, 13714–13724. [Google Scholar] [CrossRef]
  25. Huo, S.; Huang, D.; Zhang, Y. Secure output synchronization of heterogeneous multi-agent systemsagainst false data injection attacks. Sci. China Inf. Sci. 2022, 65, 162204. [Google Scholar] [CrossRef]
  26. Liu, X.K.; Wen, C.; Xu, Q.; Wang, Y.W. Resilient control and analysis for DC microgrid system under DoS and impulsive FDI attacks. IEEE Trans. Smart Grid 2021, 12, 3742–3754. [Google Scholar] [CrossRef]
  27. Feng, Z.; Hu, G. Secure Cooperative Event-Triggered Control of Linear Multiagent Systems Under DoS Attacks. IEEE Trans. Control Syst. Technol. 2020, 28, 741–752. [Google Scholar] [CrossRef]
  28. Zhang, D.; Liu, L.; Feng, G. Consensus of Heterogeneous Linear Multiagent Systems Subject to Aperiodic Sampled-Data and DoS Attack. IEEE Trans. Cybern. 2019, 49, 1501–1511. [Google Scholar] [CrossRef]
  29. Hu, S.; Yuan, P.; Yue, D.; Dou, C.; Cheng, Z.; Zhang, Y. Attack-Resilient Event-Triggered Controller Design of DC Microgrids Under DoS Attacks. IEEE Trans. Circuits Syst. I Regul. Pap. 2020, 67, 699–710. [Google Scholar] [CrossRef]
  30. Wu, W.; Chen, Y.; Zhou, L.; Luo, A.; Zhou, X.; He, Z.; Yang, L.; Xie, Z.; Liu, J.; Zhang, M. Sequence Impedance Modeling and Stability Comparative Analysis of Voltage-Controlled VSGs and Current-Controlled VSGs. IEEE Trans. Ind. Electron. 2019, 66, 6460–6472. [Google Scholar] [CrossRef]
  31. Han, R.; Meng, L.; Guerrero, J.M.; Vasquez, J.C. Distributed Nonlinear Control with Event-Triggered Communication to Achieve Current-Sharing and Voltage Regulation in DC Microgrids. IEEE Trans. Power Electron. 2018, 33, 6416–6433. [Google Scholar] [CrossRef]
  32. Sadabadi, M.S.; Shafiee, Q.; Karimi, A. Plug-and-Play Robust Voltage Control of DC Microgrids. IEEE Trans. Smart Grid 2018, 9, 6886–6896. [Google Scholar] [CrossRef]
  33. Han, J.; Zhang, H.; Jiang, H.; Sun, X. Hconsensus for linear heterogeneous multi-agent systems with state and output feedback control. Neurocomputing 2017, 275, 2635–2644. [Google Scholar] [CrossRef]
  34. He, W.; Xu, W.; Ge, X.; Han, Q.L.; Du, W.; Qian, F. Secure Control of Multiagent Systems Against Malicious Attacks: A Brief Survey. IEEE Trans. Ind. Inform. 2022, 18, 3595–3608. [Google Scholar] [CrossRef]
  35. Zhao, H.; Shan, J.; Peng, L.; Yu, H. Data-Driven Event-Triggered Bipartite Consensus for Multi-Agent Systems Preventing DoS Attacks. IEEE Control Syst. Lett. 2023, 7, 1915–1920. [Google Scholar] [CrossRef]
  36. Carl, G.; Kesidis, G.; Brooks, R.; Rai, S. Denial-of-service attack-detection techniques. IEEE Internet Comput. 2006, 10, 82–89. [Google Scholar] [CrossRef]
  37. Arcos-Aviles, D.; Pascual, J.; Marroyo, L.; Sanchis, P.; Guinjoan, F. Fuzzy Logic-Based Energy Management System Design for Residential Grid-Connected Microgrids. IEEE Trans. Smart Grid 2018, 9, 530–543. [Google Scholar] [CrossRef]
  38. Zhang, H.; Lewis, F.L.; Das, A. Optimal Design for Synchronization of Cooperative Systems: State Feedback, Observer and Output Feedback. IEEE Trans. Autom. Control 2011, 56, 1948–1952. [Google Scholar] [CrossRef]
  39. Tian, X.; Jiang, C.; Qian, B.; Wang, R. Current sharing control strategy with uncertainties and network attacks for electric vehicle charging station. IET Energy Syst. Integr. 2023. [Google Scholar] [CrossRef]
Figure 1. The flow of the methodology in this paper.
Figure 1. The flow of the methodology in this paper.
Mathematics 12 00887 g001
Figure 2. The structure of the BESS in DC microgrids with one DG and one CPL.
Figure 2. The structure of the BESS in DC microgrids with one DG and one CPL.
Mathematics 12 00887 g002
Figure 3. The fuzzy logic controller.
Figure 3. The fuzzy logic controller.
Mathematics 12 00887 g003
Figure 4. Communication topology structure.
Figure 4. Communication topology structure.
Mathematics 12 00887 g004
Figure 5. The output of system (17) under the control law (18): (a) no network attacks; (b) FDI attacks; (c) DoS attacks; (d) FDI and DoS attacks.
Figure 5. The output of system (17) under the control law (18): (a) no network attacks; (b) FDI attacks; (c) DoS attacks; (d) FDI and DoS attacks.
Mathematics 12 00887 g005
Figure 6. The output of the system (23) under the proposed control law (27): (a) outputs of this system; (b) output errors of this system.
Figure 6. The output of the system (23) under the proposed control law (27): (a) outputs of this system; (b) output errors of this system.
Mathematics 12 00887 g006
Figure 7. The membership functions of fuzzy logic controller: (a) the membership function of  Δ y i ( t ) ; (b) the membership function of d; (c) the membership function of  ι i .
Figure 7. The membership functions of fuzzy logic controller: (a) the membership function of  Δ y i ( t ) ; (b) the membership function of d; (c) the membership function of  ι i .
Mathematics 12 00887 g007
Figure 8. The output of the system under the control law (29): (a) the output of this system; (b) the update of the controller.
Figure 8. The output of the system under the control law (29): (a) the output of this system; (b) the update of the controller.
Mathematics 12 00887 g008
Figure 9. The StarSim HIL experiment system.
Figure 9. The StarSim HIL experiment system.
Mathematics 12 00887 g009
Figure 10. The output current of the system.
Figure 10. The output current of the system.
Mathematics 12 00887 g010
Table 1. Fuzzy rules.
Table 1. Fuzzy rules.
  τ i d
  Δ y i ( t ) SB
SPSPS
MPMPB
BPMPB
Table 2. Performance comparison.
Table 2. Performance comparison.
SchemeResilient Control TypeNeed Continuous InformationAverage Controller UpdateMean Sample Time
Condition [28]DoSYes15000.010
Condition [25]FDIYes15000.010
Condition (29)BothNo8350.018
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Tian, X.; Wang, W.; Zou, L.; Zhai, S.; Hai, B.; Wang, R. Energy-Management Strategy of Battery Energy Storage Systems in DC Microgrids: A Distributed Fuzzy Output Consensus Control Considering Multiple Cyber Attacks. Mathematics 2024, 12, 887. https://doi.org/10.3390/math12060887

AMA Style

Tian X, Wang W, Zou L, Zhai S, Hai B, Wang R. Energy-Management Strategy of Battery Energy Storage Systems in DC Microgrids: A Distributed Fuzzy Output Consensus Control Considering Multiple Cyber Attacks. Mathematics. 2024; 12(6):887. https://doi.org/10.3390/math12060887

Chicago/Turabian Style

Tian, Xu, Weisheng Wang, Liang Zou, Shuo Zhai, Bin Hai, and Rui Wang. 2024. "Energy-Management Strategy of Battery Energy Storage Systems in DC Microgrids: A Distributed Fuzzy Output Consensus Control Considering Multiple Cyber Attacks" Mathematics 12, no. 6: 887. https://doi.org/10.3390/math12060887

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop